lanmaster53 / honeybadgerLinks
☆233Updated 5 years ago
Alternatives and similar repositories for honeybadger
Users that are interested in honeybadger are comparing it to the libraries listed below
Sorting:
- ☆200Updated 4 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Monitor geotagged social media from multiple platforms in real time.☆77Updated 7 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- ☆73Updated 7 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆224Updated 5 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- Python3 library and command line for GreyNoise☆174Updated 4 months ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170Updated 7 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 3 years ago
- Gather Open-Source Intelligence using PowerShell.☆176Updated 6 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆143Updated 7 years ago
- Let's obscure some IPv4 addresses☆37Updated 3 years ago
- Web application to create indexes for GIAC certification examinations.☆148Updated 2 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆138Updated 8 months ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- Credential and Red Teaming Defense for Windows Environments☆328Updated last year
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- "Honey" document generator for beacon document tracking.☆57Updated 7 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- ☆194Updated last year
- A system that creates a bogus web structure to entrap and delay web scanners☆65Updated 4 years ago
- LinkedIn reconnaissance tool☆55Updated 3 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆486Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆146Updated 5 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆567Updated 5 months ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- Pastebin OSINT Harvester☆326Updated 6 years ago